[1] |
WANG Tong, ZHU Minling.
Study on Fast Realization of Serial Test and Approximate Entropy Test
[J]. Computer Engineering and Applications, 2020, 56(15): 113-117.
|
[2] |
WANG Shiyu, LIU Hongxing, FAN Jiajia.
Research on Transformation Method from Mobile User Interface Conceptual Model to Code
[J]. Computer Engineering and Applications, 2020, 56(10): 240-245.
|
[3] |
LV Congdong.
Relation between IP-secure and TA-secure in intransitive non-interference
[J]. Computer Engineering and Applications, 2018, 54(8): 78-84.
|
[4] |
XU Guoyu, MIAO Xuna, ZHANG Junfeng, JIANG Tao, MA Xiaofei.
Review of implicit authentication for mobile devices
[J]. Computer Engineering and Applications, 2018, 54(6): 19-25.
|
[5] |
ZHAO Hongda, QI Yong, LI Qianmu.
Ubiquitous network security risk assessment modeling based on COOPN
[J]. Computer Engineering and Applications, 2018, 54(4): 122-127.
|
[6] |
GAO Zhifang, SHENG Guanshuai, PENG Dinghong.
Information security risk assessment method based on compromise rate method
[J]. Computer Engineering and Applications, 2017, 53(23): 82-87.
|
[7] |
GUAN Xin, GUO Junping, WANG Xing.
Double fuzzy information security evaluation algorithm based on improved DS theory
[J]. Computer Engineering and Applications, 2017, 53(2): 112-117.
|
[8] |
CHEN Yu, WANG Yadi, WANG Jindong, LI Tao.
Study of influence on information security risks by delays of security measures
[J]. Computer Engineering and Applications, 2017, 53(19): 118-123.
|
[9] |
LIN Xianning.
Selection method of information security system based on hesitant linguistic Heronian geometric operator
[J]. Computer Engineering and Applications, 2017, 53(13): 174-180.
|
[10] |
LU Yang, GAO Bao.
Research on file integrity checking based on CityHash for e-government websites
[J]. Computer Engineering and Applications, 2016, 52(4): 104-109.
|
[11] |
CHEN Yu, WANG Yadi, WANG Jindong, WANG Kun.
Method for information system risk management based on Markov logic networks
[J]. Computer Engineering and Applications, 2016, 52(18): 104-110.
|
[12] |
YANG Long1,2, ZHANG Gongrang1,2, WANG Li1,2, WEI Yanyan1,2.
Integration of multiple knowledge bases based on knowledge blocks
[J]. Computer Engineering and Applications, 2014, 50(7): 129-132.
|
[13] |
GAO Baojian, ZHANG Ziran, JIN Yuanyuan.
OFDM-based information security algorithm
[J]. Computer Engineering and Applications, 2012, 48(5): 59-62.
|
[14] |
LIU Jinglei1, CHEN Xiangtao2, HU Hongyu1, AI Lingxian1, JIANG Heng1.
Security analysis and improvement on ID-based authenticated key agreement protocol
[J]. Computer Engineering and Applications, 2012, 48(34): 88-91.
|
[15] |
QI Yudong1, YAN Xiaobin2, XIE Xiaofang1.
Conceptual models similarity computation based on LISA theory
[J]. Computer Engineering and Applications, 2012, 48(3): 40-42.
|